LI Jian, SONG Danjie, GUO Xiaojing, et al., “An Improved Security Detection Strategy Based on W State in “Ping-pong” Protocol,” Chinese Journal of Electronics, vol. 21, no. 1, pp. 117-120, 2012,
Citation: LI Jian, SONG Danjie, GUO Xiaojing, et al., “An Improved Security Detection Strategy Based on W State in “Ping-pong” Protocol,” Chinese Journal of Electronics, vol. 21, no. 1, pp. 117-120, 2012,

An Improved Security Detection Strategy Based on W State in “Ping-pong” Protocol

  • Received Date: 2010-12-01
  • Rev Recd Date: 2011-02-01
  • Publish Date: 2012-01-05
  • To increase the efficiency of eavesdropping detection in the “Ping-pong” protocol, an improved secure detection strategy based on W states in “Ping-pong” protocol is presented. TheWstate, the decoy particles, is used to detect eavesdroppers. In the experiment, the method of the entropy theory is introduced, and three detection strategies are compared quantitatively by using the constraint between the information which eavesdropper can obtain and the interference introduced. If the eavesdropper intends to get full information, the detection rate of the original “Ping-pong” protocol is 50%; the second protocol is also 50%; and the presented protocol 58%. The experimental result shows that the efficiency of eavesdropping detection in the presented protocol is higher than the other two, so the detection strategy in the protocol can ensure the “Ping-pong” protocol more secure.
  • loading
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (694) PDF downloads(732) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return